On Thursday, December 24, 2015 04:48:58 pm Eric Rescorla wrote:
> On Thu, Dec 24, 2015 at 4:26 PM, Dave Garrett <davemgarr...@gmail.com>
> wrote:
> > Do we have anything that protects against an intermediary stripping 0RTT
> > messages from a handshake to force a fallback?
> 
> Yes:
> 1. The EarlyDataIndication tells the server that some 0-RTT messages are
> coming.
> 2. The Finished in the 0-RTT flight covers the entire handshake flight,
> thus preventing
> tampering with those messages.
> 3. The server's Finished covers the ClientHello, thus preventing tampering
> with that.

#1 & #3 are easily dealt with by injecting bogus 0-RTT messages that get 
rejected, at which point a 0RTT could be prevented and we won't get to #2.

So, the client sends a handshake with 0RTT, an intermediary strips it and 
replaces it with something that fills the slot, but will get rejected, the 
server rejects it and falls back to 1RTT, and then the client would have to 
accept this. This intermediary thus has the power to force any 0RTT attempt to 
fall back to 1RTT.


Dave

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to